Welcome!

Wearables Authors: Pat Romanski, Liz McMillan, Yeshim Deniz, Jnan Dash, Roger Strukhoff

Blog Feed Post

Mobile Cyber Security News Weekly – Week of December 29, 2013

Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week.  I am specifically targeting market trend information.

Also read Enterprise Mobility Asia News Weekly
Also read Field Mobility News Weekly
Also read M2M News Weekly
Also read Mobile Commerce News Weekly
Also read Mobile Health News Weekly
Also read Mobility News Weekly

Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here!

Frost & Sullivan estimates the global mobile endpoint protection market to reach $1 billion in 2017, up from just $433.5 million last year. Read Original Content

A recent study commissioned by IT security solutions provider Lumension and conducted by the Ponemon Institute indicate a large majority (75 percent) of IT security experts feel attacks on smartphones and other mobile devices will be the main security concerns of major companies in the coming year. Read Original Content

McAfee is predicting mobile malware in particular will drive growth for the security industry next year. Mobile attacks could include malicious software that steals data from legitimate apps or software that is installed via NFC. Read Original Content

Magic Software Enterprises, with a presence in more than 50 countries, provides development, deployment, and integration of core business applications, supporting scalable deployment on multiple channels, including on-premise, Web (HTML5), rich Internet, mobile, and SaaS. This newsletter is sponsored in part by Magic Software Enterprises.

AT&T has made available a new application programming interface toolkit it says can help businesses make mobile transactions safer and easier for AT&T mobile subscribers. The toolkit is designed to allow businesses to automate fraud-avoidance queries and the completion of basic forms for subscribers during transactions. Read Original Content

Tripwire, Inc. has announced the results of a survey on mobile security and holiday shopping, revealing nearly two-thirds of U.S. consumers (59 percent) and U.K. consumers (65 percent) have no security software on their mobile devices. Read Original Content
The Singapore government is offering more scholarships to encourage young people to pursue degrees and diplomas in cyber security, Communications and Information Minister Yaacob Ibrahim said. Read Original Content

All of the top 100 paid Android apps and 56 percent of the top 100 paid Apple iOS apps have been hacked, research has revealed. Compared with the 2012 research, the proportion of compromised free Android apps has decreased from 80 percent to 73 percent, but increased in free iOS apps from 40 percent to 53 percent. Read Original Content

MarketsandMarkets expects the global smartphone security market to grow from $387.15 million in 2010 to $2964.89 million by 2016. Global smartphone security market for Android OS is the fastest growing one with a CAGR of 65.05 percent from 2011 to 2016 due to increasing number of applications. Read Original Content

By the end of 2014, a wealth of new smartphones could come with biometric technology, such as fingerprint recognition hardware. In September, Apple released the iPhone 5s, which included a fingerprint reader, in the hope of bolstering security and improving usability. Read Original Content

Recent Articles by Kevin Benedict

A New Perspective on Enterprise Mobility and 2014 Requirements, Part 1
Operational Tempo, Faster than Real-Time, Enterprise Mobility and the Next Y2K Event
Digital Transformation, 3D Laser Scanning of Assets, Mobile Devices and Field Services
Digital Transformation, Mobile Technologies and Customer Engagement Models - Transilio
Merging the Physical with the Digital for Optimized Productivity
Thinking about Enterprise Mobility, Digital Transformation and Doctrine
Reducing Conjecture with Enterprise Mobility and M2M

Videos of Note

ROI Calculation for Optimizing the Mobile Workforce

Webinars of Note (Recorded)

Build an app in two minutes
Building Effective Mobile Business Screens
Mobile Apps For JD Edwards

Whitepapers of Note

4 Tips for Effective Mobile Screens
10 Tips To Design Effective Mobile Screens For Business
Don't Get SMACked - How Social, Mobile, Analytics and Cloud are Reshaping the Enterprise
Making BYOD Work for Your Organization


*************************************************************
Kevin Benedict
Senior Analyst, Digital Transformation Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Join the Linkedin Group Strategic Enterprise Mobility

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Read the original blog entry...

More Stories By Kevin Benedict

Kevin Benedict serves as the Senior Vice President, Solutions Strategy, at Regalix, a Silicon Valley based company, focused on bringing the best strategies, digital technologies, processes and people together to deliver improved customer experiences, journeys and success through the combination of intelligent solutions, analytics, automation and services. He is a popular writer, speaker and futurist, and in the past 8 years he has taught workshops for large enterprises and government agencies in 18 different countries. He has over 32 years of experience working with strategic enterprise IT solutions and business processes, and he is also a veteran executive working with both solution and services companies. He has written dozens of technology and strategy reports, over a thousand articles, interviewed hundreds of technology experts, and produced videos on the future of digital technologies and their impact on industries.

IoT & Smart Cities Stories
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...